The increasing digitalization of Instrumentation and Control (I&C) systems in Nuclear Power Plants (NPPs) has improved operational efficiency while introducing cybersecurity vulnerabilities. Conventional network-based intrusion detection systems (IDS) face limitations in detecting sophisticated cyber threats targeting safety-critical controllers. To address these challenges, this study proposes a process information-driven cyber threat detection methodology based on real-time process data analysis and control logic consistency, enabling non-intrusive threat identification. The proposed methodology was examined through simulation and experimental testing using an APR-1400 Reactor Protection System (RPS) testbed. A cyber attack scenario targeting the High Pressurizer Pressure (HPP) Trip function was designed to assess the effectiveness of the detection mechanism. Simulation results demonstrated the detection algorithm's ability to identify unauthorized modifications to the trip setpoint, indicating the potential to detect cyber threats affecting reactor trip logic. Furthermore, experimental testing using the Safety Data Acquisition & Detection System (SDDS) demonstrated real-time anomaly detection while maintaining system integrity. These findings suggest that the proposed process-driven detection technique can enhance the cybersecurity resilience of NPPs without disrupting operational stability.
The coherence of built architecture often depends on a latent structural design whose essential role can govern architectural outcomes even when not overtly visible. Structural logic is either integrated into the building as a whole or concealed behind finished surfaces. However, this concealed structure often defines space and regulates formal relationships. Instead of viewing structure and form as opposites or as directly corresponding, it is more accurate to understand them as mutually influential, their relationship shaped by specific design choices. Every construction act creates an order, and every form manifests through its underlying structure, highlighting an ongoing interplay between these elements. [read more]
In this paper, we consider an approach introduced in term rewriting for the automatic detection of non-looping non-termination from patterns of rules. We adapt it to logic programming by defining a new unfolding technique that produces patterns describing possibly infinite sets of finite rewrite sequences. We present an experimental evaluation of our contributions that we implemented in our tool NTI.
Aymen Abdelmoumen, Zakaria Benzadri, Ismael Bouassida Rodriguez
et al.
The increasing adoption of system-of-systems (SoS) engineering has emerged as a crucial approach for designing architectures that manage complex, decentralized systems across various domains, including IoT-enabled infrastructure. This paper introduces a metamodel that aligns with the ISO/IEC/IEEE 42010:2022 standard for architecture description, tailored to address the unique challenges of SoS. A formal classification technique leveraging first-order predicate logic ensures precise and consistent SoS categorization. The metamodel’s applicability is demonstrated through a case study on integrated water and energy management, involving real-world implementation. To evaluate its effectiveness, the Goal-Question-Metric (GQM) methodology is applied, detailing metrics for performance, relevance, usefulness and adaptability. A comparative analysis with existing models underscores the metamodel’s strengths in addressing SoS-specific requirements. By bridging theoretical rigor with practical usability, this work advances SoS modeling and offers a standards-based solution, with IoT-enabled examples illustrating its versatility and potential.
Cooperative multi-UAV clusters have been widely applied in complex mission scenarios due to their flexible task allocation and efficient real-time coordination capabilities. The Air Command Aircraft (ACA), as the core node within the UAV cluster, is responsible for coordinating and managing various tasks within the cluster. When the ACA undergoes fault recovery, a handover operation is required, during which the ACA must re-authenticate its identity with the UAV cluster and re-establish secure communication. However, traditional, centralized identity authentication and ACA handover mechanisms face security risks such as single points of failure and man-in-the-middle attacks. In highly dynamic network environments, single-chain blockchain architectures also suffer from throughput bottlenecks, leading to reduced handover efficiency and increased authentication latency. To address these challenges, this paper proposes a mathematically structured dual-chain framework that utilizes a distributed ledger to decouple the management of identity and authentication information. We formalize the ACA handover process using cryptographic primitives and accumulator functions and validate its security through BAN logic. Furthermore, we conduct quantitative analyses of key performance metrics, including time complexity and communication overhead. The experimental results demonstrate that the proposed approach ensures secure handover while significantly reducing computational burden. The framework also exhibits strong scalability, making it well-suited for large-scale UAV cluster networks.
Non-classical generalizations of classical modal logic have been developed in the contexts of constructive mathematics and natural language semantics. In this paper, we discuss a general approach to the semantics of non-classical modal logics via algebraic representation theorems. We begin with complete lattices $L$ equipped with an antitone operation $\neg$ sending $1$ to $0$, a completely multiplicative operation $\Box$, and a completely additive operation $\Diamond$. Such lattice expansions can be represented by means of a set $X$ together with binary relations $\vartriangleleft$, $R$, and $Q$, satisfying some first-order conditions, used to represent $(L,\neg)$, $\Box$, and $\Diamond$, respectively. Indeed, any lattice $L$ equipped with such a $\neg$, a multiplicative $\Box$, and an additive $\Diamond$ embeds into the lattice of propositions of a frame $(X,\vartriangleleft,R,Q)$. Building on our recent study of "fundamental logic", we focus on the case where $\neg$ is dually self-adjoint ($a\leq \neg b$ implies $b\leq\neg a$) and $\Diamond \neg a\leq\neg\Box a$. In this case, the representations can be constrained so that $R=Q$, i.e., we need only add a single relation to $(X,\vartriangleleft)$ to represent both $\Box$ and $\Diamond$. Using these results, we prove that a system of fundamental modal logic is sound and complete with respect to an elementary class of bi-relational structures $(X,\vartriangleleft, R)$.
Abstract With increasing demand for wearable electronics capable of computing huge data, flexible neuromorphic systems mimicking brain functions have been receiving much attention. Despite considerable efforts in developing practical neural networks utilizing several types of flexible artificial synapses, it is still challenging to develop wearable systems for complex computations due to the difficulties in emulating continuous memory states in a synaptic component. In this study, polymer conductivity is analyzed as a crucial factor in determining the growth dynamics of metallic filaments in organic memristors. Moreover, flexible memristors with bio‐mimetic synaptic functions such as linearly tunable weights are demonstrated by engineering the polymer conductivity. In the organic memristor, the cluster‐structured filaments are grown within the polymer medium in response to electric stimuli, resulting in gradual resistive switching and stable synaptic plasticity. Additionally, the device exhibits the continuous and numerous non‐volatile memory states due to its low leakage current. Furthermore, complex hardware neural networks including ternary logic operators and a noisy image recognitions system are successfully implemented utilizing the developed memristor arrays. This promising concept of creating flexible neural networks with bio‐mimetic weight distributions will contribute to the development of a new computing architecture for energy‐efficient wearable smart electronics.
This paper concerns an expansion of first-order Belnap-Dunn logic whose connectives and quantifiers all have a counterpart in classical logic. The language and logical consequence relation of this paradefinite logic are defined, a sequent calculus proof system for this logic is presented, and the soundness and completeness of this proof system is established. It is shown that the defined logic distinguishes itself from the many other paradefinite logics that are usually considered equally classical by the classical laws of logical equivalence that hold for it. It is further argued that the defined logic is the most natural paradefinite logic relative to the version of classical logic with the same language. Moreover, a simple embedding of the defined logic in that version of classical logic is presented and the potential of the logic for dealing with inconsistencies and incompletenesses in inductive machine learning is discussed.
In this paper, I argue for an Afro-communitarian account of personhood that considers the value of complementarity as a necessary part of human existence. The reason for conceptualizing personhood as a complementary enterprise is to dispel the understanding of gender that sustains gender inequality. I aim to explore the logic that characterizes complementary personhood as a specific kind of Afro-communitarian personhood that can account for gender complementarity. I argue that the universalized idea of patriarchy and gender, as construed within Western feminist theorizing, cannot account for every society as these concepts differ from culture to culture. In this paper, I use complementary personhood as a lens through which a fluid understanding of gender and gender relations can be drawn against the backdrop of the hierarchy and binary opposition that undergird most Western interrogations of the concepts of gender and patriarchy. To do so, I present an overview of what complementary personhood entails. The preceding elucidation would become the basis for understanding the Afro-centric notion of gender relation. I then tease out an Afro-centric triangle of gender relations using the Ezumezu logical system as its background logic.
In this paper, we present an alternative interpretation of propositional inquisitive logic as an epistemic logic of knowing how. In our setting, an inquisitive logic formula $α$ being supported by a state is formalized as "knowing how to resolve $α$" (more colloquially, "knowing how $α$ is true") holds on the S5 epistemic model corresponding to the state. Based on this epistemic interpretation, we use a dynamic epistemic logic with both know-how and know-that operators to capture the epistemic information behind the innocent-looking connectives in inquisitive logic. We show that the set of valid know-how formulas corresponds precisely to the inquisitive logic. The main result is a complete axiomatization with intuitive axioms using the full dynamic epistemic language. Moreover, we show that the know-how operator and the dynamic operator can both be eliminated without changing the expressivity over models, which is consistent with the modal translation of inquisitive logic existing in the literature. We hope our framework can give an intuitive alternative interpretation of various concepts and technical results in inquisitive logic, and also provide a powerful and flexible tool to do inquisitive reasoning in an epistemic context.
Oleksii M. Shushura, Liudmyla A. Asieieva, Oleksiy L. Nedashkivskiy
et al.
The widespread use of computer technology, its rapid development and use in almost all areas of human activity requires constant updating of information security issues. The activities of many enterprises in the field of IT, construction, and other areas are of a project nature and therefore further research on information security management of projects is relevant. Appearance of changes and the current state of the project results at certain points of time describe the documents that accompany it. In this paper, the information structure of the project is considered as a set of specific documents. During the life cycle of each project document, which includes the creation, transfer, preservation and transformation, there are generally threats to its confidentiality, integrity, accessibility and authenticity. This paper develops a method for assessing the risks of violation of the availability of project documents in solving information security problems. A formal description of many project documents in the form of a generalized hierarchical structure is presented, the connection of documents with the operations performed on them and information systems used during these operations is formalized. Given the incompleteness and dimension of the data, the based on fuzzy logic model was developed to assess the risk of document accessibility. Approaches to the assessment of the damage from the violation of the availability of the project document and the method of calculating the overall assessment of the risk of violation of the documents availability are proposed. The results presented in this paper can be used in decision-making processes regarding information security of projects in organizations that have project activities. The approaches proposed in this paper can serve as a basis for the creation of specialized information technologies to automate the calculation of project risk assessments.
This paper presents a simple decidable logic of functional dependence LFD, based on an extension of classical propositional logic with dependence atoms plus dependence quantifiers treated as modalities, within the setting of generalized assignment semantics for first order logic. The expressive strength, complete proof calculus and meta-properties of LFD are explored. Various language extensions are presented as well, up to undecidable modal-style logics for independence and dynamic logics of changing dependence models. Finally, more concrete settings for dependence are discussed: continuous dependence in topological models, linear dependence in vector spaces, and temporal dependence in dynamical systems and games.
This article offers an overview of Marilena Chaui’s reading of the <i>Tractatus Theologico-Politicus</i> (TTP). Chaui has published numerous books and essays on Baruch Spinoza. Her two-volume study <i>The Nerve of Reality</i> is the culmination of a decades-long engagement with the Dutch philosopher, and her research has been a valuable resource for generations of Latin American scholars. From this extensive output, we focus on Chaui’s main texts on the theological-political, concentrating on her analysis of the concept of superstition and the philosophical language of the TTP, which Chaui calls a “counter-discourse”. Spinoza’s enduring relevance for the interpretation of contemporary phenomena is clarified by Chaui’s analysis of the TTP, which establishes a fundamentally political understanding of superstition.
Gottlob Frege (1848-1925) transformed the field of logic from what it had remained since the days of Aristotle. Regarded as the founder of modern logic and much of modern philosophy, Frege laid the foundations of predicate logic, first-order predicate calculus and quantificational logic – formal systems central to computer science and mathematics. Frege was not satisfied with the ambiguity and imprecision of ordinary language. He created a new ‘formula language’ with elaborate symbols and definite rules, focused on conceptual content rather than rhetorical style, which he called Begriffsschrift – a formal language for 'pure thought'. Before Frege, George Boole (1815-1864) created what later became known as ‘Boolean logic’ which is fundamental to operations of computer science today. An application of Wittgensteinian logic could help filter authentic information from information disorder (non-information, off-information, mal-information and mis-information). Wittgensteinian logic applied in natural language processing technology (NLP), if possible and via automation, could transform the quality of information online. Many challenges remain.
Contextuality is a key signature of quantum non-classicality, which has been shown to play a central role in enabling quantum advantage for a wide range of information-processing and computational tasks. We study the logic of contextuality from a structural point of view, in the setting of partial Boolean algebras introduced by Kochen and Specker in their seminal work. These contrast with traditional quantum logic à la Birkhoff and von Neumann in that operations such as conjunction and disjunction are partial, only being defined in the domain where they are physically meaningful. We study how this setting relates to current work on contextuality such as the sheaf-theoretic and graph-theoretic approaches. We introduce a general free construction extending the commeasurability relation on a partial Boolean algebra, i.e. the domain of definition of the binary logical operations. This construction has a surprisingly broad range of uses. We apply it in the study of a number of issues, including: - establishing the connection between the abstract measurement scenarios studied in the contextuality literature and the setting of partial Boolean algebras; - formulating various contextuality properties in this setting, including probabilistic contextuality as well as the strong, state-independent notion of contextuality given by Kochen-Specker paradoxes, which are logically contradictory statements validated by partial Boolean algebras, specifically those arising from quantum mechanics; - investigating a Logical Exclusivity Principle, and its relation to the Probabilistic Exclusivity Principle widely studied in recent work on contextuality as a step towards closing in on the set of quantum-realisable correlations; - developing some work towards a logical presentation of the Hilbert space tensor product, using logical exclusivity to capture some of its salient quantum features.
A novel Set Point Weighting Iterative Learning Controller (SPW-ILC) has been proposed for voltage stabilization at AC/DC bus, coordinated control among the distributed sources in the modeled hybrid microgrid (HMG) and synchronization of HMG with utility grid. The Aichi Micro grid test system located at Aichi Institute of Technology, Japan has been considered for the simulation studies and modeled in MATLAB/Simulink environment. The Aichi microgrid can be operated in autonomous mode as AC system and DC system. When it is working as DC system, the dc bus voltage is maintained stable by incorporating dedicated fuzzy logic controllers (FLC) for DC-DC converters due to the variable distributed sources. Meanwhile, the bidirectional converter also called as Interlinking Converter (IC) located between ac bus and dc bus controlled by proposed SPW-ILC converts the DC voltage into AC voltage and meets AC loads. In AC system of autonomous mode, the inverters are controlled by proposed controller to meet the ac demands. The grid connected mode of Aichi microgrid system is performed by properly controlling the IC to meet ac and dc loads. The proposed SPW-ILC reduces the voltage deviation and maintains the power balance under variable source and load conditions. The results have been compared with the conventional proportional integral (PI) controller and FLC to validate the performance of the controller. The results show that the proposed SPW-ILC has efficiently control the voltage and maintain the power balance.
This paper problematizes the use of the concept of contemporary to describe a specific modus operandi of a group of directors and films that no longer identify with the characteristics of modern cinema. Using the symbolic date of 9/11 as an historical decisive moment, we take as an example of this cinema, Loong Boonmee raleuk chat, winner of 2010’s Palme D’Or at Cannes Film Festival. In analysing Apichatpong Weerasethakul’s film, we aim at proposing, as a metaphor, a different approach - a logic of the building - in order to describe the specific creative processes in contemporary cinema. In order to describe the Thai filmmaker’s method, we will recuperate Giorgio Agamben’s ideas about what it means to be contemporary, and also the ethical responsibility of cinema in helping to recover the lost gestures of humanity.